CVE-2023-24057
Java vulnerability analysis and mitigation

Overview

HL7 (Health Level 7) FHIR Core Libraries before version 5.6.92 contains a directory traversal vulnerability that allows attackers to extract files into arbitrary directories. The vulnerability was discovered and assigned CVE-2023-24057, with the initial disclosure date of January 22, 2023. The vulnerability affects the package-decompression feature when handling crafted ZIP or TGZ archives, specifically in scenarios involving prepackaged terminology cache, NPM package, or comparison archive processing (MITRE CVE, NVD).

Technical details

The vulnerability stems from insufficient validation of zip file entries during the unpacking process, potentially allowing malicious writes outside the intended destination directory. The issue specifically affects multiple components including Publisher.java, WebSourceProvider.java, ZipFetcher.java, and IGPack2NpmConvertor.java. The CVSS v3.1 base score for this vulnerability is 9.1 (Critical), with attack vector: Network, attack complexity: Low, privileges required: High, user interaction: None, scope: Changed, and high impact on confidentiality, integrity, and availability (GitHub Advisory).

Impact

The vulnerability can lead to arbitrary file writes outside of intended directories through directory traversal attacks. This could potentially allow attackers to manipulate or overwrite system files, leading to system compromise. The high CVSS score indicates severe potential impacts on system confidentiality, integrity, and availability (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in HL7 FHIR Core Libraries version 5.6.92 and later. Users are strongly advised to upgrade to this version or newer to mitigate the risk. It's worth noting that an incomplete fix led to a subsequent vulnerability (CVE-2023-28465), which was later addressed in version 5.6.106 (NVD).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13805MEDIUM6.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13804MEDIUM5.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66372LOW2.8
  • JavaJava
  • org.mustangproject:library
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management